IT 101 - Chapter 3
IT 101 - Chapter 3
IT 101 - Chapter 3
People
Privacy – What are the threats to personal privacy and how can we protect
ourselves?
Security – How can access to sensitive information be controlled and how can
we secure hardware and software?
Ethics – How do the actions of individual users and companies affect society?
This module is a property of Saint Joseph Institute of Technology (SJIT). The term module refers to an instructional material that focuses on a specific course. Details and
activities vary according to specific content and focus on student-centered learning activities.
No part of this module may be reproduced or transmitted in any form or any means without approval of the CEO/President.
• Computer viruses, worms, Trojan horses, and rootkits are all classified as
malware (malicious software), which are programs that act without a user’s
knowledge and deliberately alter the computer’s operations.
• The payload is the destructive event or prank the program is intended to deliver.
Infected computers can suffer from one or more of the following symptoms:
• OS running slower
• Less available memory
• Corrupted files
• Unusual messages or images
• Unusual sounds playing
• Existing programs and files
disappear
• Programs or files not working
properly
• Unusual programs or files appear
• OS does not start up or
unexpectedly shuts down
This module is a property of Saint Joseph Institute of Technology (SJIT). The term module refers to an instructional material that focuses on a specific course. Details and
activities vary according to specific content and focus on student-centered learning activities.
No part of this module may be reproduced or transmitted in any form or any means without approval of the CEO/President.
Malware delivers its payload on a computer when a user
◦ Opens an infected file
◦ Runs an infected program
◦ Boots the computer with infected removable media inserted
◦ Connects to an unprotected computer or network
◦ When a certain condition or event occurs, such as the clock changing to a
specific date
This module is a property of Saint Joseph Institute of Technology (SJIT). The term module refers to an instructional material that focuses on a specific course. Details and
activities vary according to specific content and focus on student-centered learning activities.
No part of this module may be reproduced or transmitted in any form or any means without approval of the CEO/President.
A virus hoax is an e-mail message that warns users of a nonexistent virus or
other malware.
They come in the form of chain mail and inform users to delete an important
system file claiming it is malware.
Botnets
A botnet is a group of compromised computers connected to a network such as
the Internet that are used as part of a network that attacks other networks.
A compromised computer, known as a zombie, is one whose owner is unaware
the computer is being controlled remotely by an outsider.
A bot is a program that performs a repetitive task on a network.
Cybercriminals install malicious bots on unprotected computers to create a
botnet, also called a zombie army.
Back Doors
A back door is a program or set of instructions in a program that allow users to
bypass security controls when accessing a program, computer, or network.
Some malware will install a back door once it infects the victim computer.
Spoofing
Spoofing is a technique intruders use to make their network or Internet
transmission appear legitimate to a victim computer or network.
E-mail spoofing occurs when the sender’s address or other components of the e-
mail header are altered so that it appears the e-mail originated from a different
sender.
IP spoofing occurs when an intruder computer fools a network into believing its
IP address is associated with a trusted source.
Some of the latest antivirus programs include provisions to protect a computer
form DoS and DDoS attacks.
Users can also implement firewall solutions, install intrusion detection software,
and set up honeypots.
This module is a property of Saint Joseph Institute of Technology (SJIT). The term module refers to an instructional material that focuses on a specific course. Details and
activities vary according to specific content and focus on student-centered learning activities.
No part of this module may be reproduced or transmitted in any form or any means without approval of the CEO/President.
Firewalls
A firewall is a hardware and/or software that protects a network’s resources from
intrusion by users on another network such as the Internet.
A proxy server is a server outside the organization’s network that controls
which communications pass into the organization’s network.
A personal firewall is a utility program that detects and protects a
personal computer and its data from unauthorized intrusions.
Honeypots
A honeypot is a vulnerable computer that is set up to entice an intruder to break
into it.
They appear real to the intruder but are separated from the organization’s
network.
They are used to learn how intruders are exploiting their network.
Unauthorized Access and Use
Unauthorized access is the use of a computer or network without permission.
Unauthorized use is the use of a computer or its data for unapproved or possibly
illegal activities.
At a minimum, organizations should have a written acceptable use policy (AUP)
that outlines the computer activities for which the computer and network may and
may not be used.
This module is a property of Saint Joseph Institute of Technology (SJIT). The term module refers to an instructional material that focuses on a specific course. Details and
activities vary according to specific content and focus on student-centered learning activities.
No part of this module may be reproduced or transmitted in any form or any means without approval of the CEO/President.
A CAPTCHA, which stands for Completely Automated Public Turing test to tell
Computers and Humans Apart, is a program developed at CMU to verify that
user input is not computer generated.
A passphrase is a private combination of words, often containing mixed
capitalization and punctuation, associated with a user name, to be used in place
of a password.
Possessed Objects
A possessed object is any item that you must carry to gain access to a computer
or computer facility (badges, cards, keys).
A personal identification number (PIN) is a numeric password, either assigned by
a company or selected by a user.
Biometric Devices
A biometric device authenticates a person’s identity by translating a personal
characteristic, such as a fingerprint, into digital code that is compared with a
digital code stored in the computer verifying a physical or behavioral
characteristic.
◦ Ex. Biometric payment is used, where a customer’s fingerprint is read and
their account is charged.
Biometric devices have disadvantages.
◦ Ex. Cut finger for fingerprint readers.
Digital Forensics.
Digital forensics, also called computer forensics, network forensics, or
cyberforensics, is the discovery, collection, and analysis of evidence found on
computers and networks.
This module is a property of Saint Joseph Institute of Technology (SJIT). The term module refers to an instructional material that focuses on a specific course. Details and
activities vary according to specific content and focus on student-centered learning activities.
No part of this module may be reproduced or transmitted in any form or any means without approval of the CEO/President.
Software Theft
Software theft occurs when someone steals software media, intentionally erases
programs, illegally copies a program, or illegally registers and/or activates a
program.
Software piracy is the unauthorized and illegal duplication of copyrighted
software.
Illegally obtaining registration numbers can be done with keygens, short for key
generators.
Information Theft
Information theft occurs when someone steals personal or confidential
information.
It has potential of causing more damage than hardware or software theft.
Information transmitted over networks offers a higher degree of risk.
Encryption
Encryption is a process of converting readable data into unreadable characters to
prevent unauthorized access.
It is treated like any other data (it can be stored, sent, etc.)
To read the data, the recipient must decrypt, or decipher, it into a readable form.
The unencrypted, readable data is called plaintext.
The encrypted (scrambled) data is called ciphertext.
An encryption algorithm, or cypher, is a set of steps that can convert readable
plaintext into unreadable ciphertext.
This module is a property of Saint Joseph Institute of Technology (SJIT). The term module refers to an instructional material that focuses on a specific course. Details and
activities vary according to specific content and focus on student-centered learning activities.
No part of this module may be reproduced or transmitted in any form or any means without approval of the CEO/President.
• An encryption key is a set of characters that the originator of the data uses to
encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.
• With private key encryption, also called symmetric key encryption, both the
originator and the recipient use the same secret key to encrypt and decrypt the
data.
• Public key encryption, also called asymmetric key encryption, uses two
encryption keys, a public and a private.
• A message generated with a public key can be decrypted only with the private
key.
• Some operating systems and e-mail programs allow you to encrypt the contents
of files.
• Programs such as pretty Good Privacy (PGP) can be used as well.
• A digital signature is an encrypted code that a person, Web site, or organization
attaches to an electronic message to verify the identity of the message sender.
• It consists of the user’s name and a hash of all or part of the message, which is a
mathematical formula that generates a code from the contents of the message.
• Many Web browsers offer 40-bit, 128-bit, and even 1024-bit encryption, which
are even higher levels of protection since they have longer keys.
• A Web site that uses encryption techniques is known as a secure site, which use
digital certificates along with a security protocol.
Digital Certificates
A digital certificate is a notice that guarantees a user or a Web site is legitimate.
A certificate authority (CA) is an authorized person or company that issues and
verifies digital certificates.
This module is a property of Saint Joseph Institute of Technology (SJIT). The term module refers to an instructional material that focuses on a specific course. Details and
activities vary according to specific content and focus on student-centered learning activities.
No part of this module may be reproduced or transmitted in any form or any means without approval of the CEO/President.
Secure HTTP
Secure HTTP (S-HTTP) allows users to choose an encryption scheme for data
that passes between a client and server.
It is more difficult than TLS to use, but it is also more secure.
This module is a property of Saint Joseph Institute of Technology (SJIT). The term module refers to an instructional material that focuses on a specific course. Details and
activities vary according to specific content and focus on student-centered learning activities.
No part of this module may be reproduced or transmitted in any form or any means without approval of the CEO/President.